cloud service
Recently Published Documents


TOTAL DOCUMENTS

3100
(FIVE YEARS 1771)

H-INDEX

43
(FIVE YEARS 24)

2022 ◽  
Vol 25 (1) ◽  
pp. 1-37
Author(s):  
Stefano Berlato ◽  
Roberto Carbone ◽  
Adam J. Lee ◽  
Silvio Ranise

To facilitate the adoption of cloud by organizations, Cryptographic Access Control (CAC) is the obvious solution to control data sharing among users while preventing partially trusted Cloud Service Providers (CSP) from accessing sensitive data. Indeed, several CAC schemes have been proposed in the literature. Despite their differences, available solutions are based on a common set of entities—e.g., a data storage service or a proxy mediating the access of users to encrypted data—that operate in different (security) domains—e.g., on-premise or the CSP. However, the majority of these CAC schemes assumes a fixed assignment of entities to domains; this has security and usability implications that are not made explicit and can make inappropriate the use of a CAC scheme in certain scenarios with specific trust assumptions and requirements. For instance, assuming that the proxy runs at the premises of the organization avoids the vendor lock-in effect but may give rise to other security concerns (e.g., malicious insiders attackers). To the best of our knowledge, no previous work considers how to select the best possible architecture (i.e., the assignment of entities to domains) to deploy a CAC scheme for the trust assumptions and requirements of a given scenario. In this article, we propose a methodology to assist administrators in exploring different architectures for the enforcement of CAC schemes in a given scenario. We do this by identifying the possible architectures underlying the CAC schemes available in the literature and formalizing them in simple set theory. This allows us to reduce the problem of selecting the most suitable architectures satisfying a heterogeneous set of trust assumptions and requirements arising from the considered scenario to a decidable Multi-objective Combinatorial Optimization Problem (MOCOP) for which state-of-the-art solvers can be invoked. Finally, we show how we use the capability of solving the MOCOP to build a prototype tool assisting administrators to preliminarily perform a “What-if” analysis to explore the trade-offs among the various architectures and then use available standards and tools (such as TOSCA and Cloudify) for automated deployment in multiple CSPs.


2022 ◽  
Vol 21 (2) ◽  
pp. 460-473
Author(s):  
Guo-feng YANG ◽  
Yong YANG ◽  
Zi-kang HE ◽  
Xin-yu ZHANG ◽  
Yong HE

Author(s):  
Lei Wang ◽  
Yichao Ma ◽  
Liuzhu Zhu ◽  
Xuli Wang ◽  
Hao Cong ◽  
...  

Author(s):  
Neha Kewate

Abstract: Cloud computing is something simple we can define as maintaining data centers and data servers and also u can access technology services by computing power, storage, and database using cloud computing technology AWS(Amazon Web Services). It is an emerged model which is already popular among almost all enterprises. It provides us the concept of ondemand services where we are using and scaling cloud resources on demand and as per demand respectively. AWS Cloud computing is a cost-effective model. The major concern in this model is Security and Storage in the cloud. This is one of the major reasons many enterprises of choosing AWS cloud computing. This paper provides a review of security research in the field of cloud security and storage services of the AWS cloud platform. After security and storage, we have presented the working of AWS (Amazon Web Service) cloud computing. AWS is the most trusted provider of cloud computing which not only provides excellent cloud security but also provides excellent cloud storage services. The main aim of this paper is to make cloud computing storage and security a core operation and not an add-on operation. As per the increase in the Service provider and related companies, this AWS Cloud Platform plays a vital role in service industries by giving its best web services, so, therefore, choosing the cloud service providers wisely is the basic need of the industry. Therefore we are going to see how AWS fulfills all these specific needs. Keywords: Trusted Computing, AWS, Information-Centric Security, Cloud Storage, S3, EC2, Cloud Computing


2022 ◽  
Vol 14 (2) ◽  
pp. 398
Author(s):  
Pieter Kempeneers ◽  
Tomas Kliment ◽  
Luca Marletta ◽  
Pierre Soille

This paper is on the optimization of computing resources to process geospatial image data in a cloud computing infrastructure. Parallelization was tested by combining two different strategies: image tiling and multi-threading. The objective here was to get insight on the optimal use of available processing resources in order to minimize the processing time. Maximum speedup was obtained when combining tiling and multi-threading techniques. Both techniques are complementary, but a trade-off also exists. Speedup is improved with tiling, as parts of the image can run in parallel. But reading part of the image introduces an overhead and increases the relative part of the program that can only run in serial. This limits speedup that can be achieved via multi-threading. The optimal strategy of tiling and multi-threading that maximizes speedup depends on the scale of the application (global or local processing area), the implementation of the algorithm (processing libraries), and on the available computing resources (amount of memory and cores). A medium-sized virtual server that has been obtained from a cloud service provider has rather limited computing resources. Tiling will not only improve speedup but can be necessary to reduce the memory footprint. However, a tiling scheme with many small tiles increases overhead and can introduce extra latency due to queued tiles that are waiting to be processed. In a high-throughput computing cluster with hundreds of physical processing cores, more tiles can be processed in parallel, and the optimal strategy will be different. A quantitative assessment of the speedup was performed in this study, based on a number of experiments for different computing environments. The potential and limitations of parallel processing by tiling and multi-threading were hereby assessed. Experiments were based on an implementation that relies on an application programming interface (API) abstracting any platform-specific details, such as those related to data access.


2022 ◽  
Author(s):  
Zhiheng Zhong ◽  
Minxian Xu ◽  
Maria Alejandra Rodriguez ◽  
Chengzhong Xu ◽  
Rajkumar Buyya

Containerization is a lightweight application virtualization technology, providing high environmental consistency, operating system distribution portability, and resource isolation. Existing mainstream cloud service providers have prevalently adopted container technologies in their distributed system infrastructures for automated application management. To handle the automation of deployment, maintenance, autoscaling, and networking of containerized applications, container orchestration is proposed as an essential research problem. However, the highly dynamic and diverse feature of cloud workloads and environments considerably raises the complexity of orchestration mechanisms. Machine learning algorithms are accordingly employed by container orchestration systems for behavior modelling and prediction of multi-dimensional performance metrics. Such insights could further improve the quality of resource provisioning decisions in response to the changing workloads under complex environments. In this paper, we present a comprehensive literature review of existing machine learning-based container orchestration approaches. Detailed taxonomies are proposed to classify the current researches by their common features. Moreover, the evolution of machine learning-based container orchestration technologies from the year 2016 to 2021 has been designed based on objectives and metrics. A comparative analysis of the reviewed techniques is conducted according to the proposed taxonomies, with emphasis on their key characteristics. Finally, various open research challenges and potential future directions are highlighted.


2022 ◽  
Vol 2022 ◽  
pp. 1-12
Author(s):  
Se-Joon Park ◽  
Yong-Joon Lee ◽  
Won-Hyung Park

Recently, due to the many features and advantages of cloud computing, “cloud service” is being introduced to countless industries around the world at an unbelievably rapid pace. However, with the rapid increase in the introduction of cloud computing services, security vulnerabilities are increasing and the risk of technology leakage from cloud computing services is also expected to increase in social network service. Therefore, this study will propose an AWS-based (Amazon Web Services) security architecture configuration method that can be applied for the entire life cycle (planning, establishment, and operation) of cloud services for better security in AWS Cloud Services, which is the most used cloud service in the world. The proposed AWS security guide consists of five different areas, Security Solution Selection Guide, Personal Information Safeguard Guide, Security Architecture Design Guide, Security Configuration Guide, and Operational Security Checklist, for a safe social network. The AWS Security Architecture has been designed with three reference models: Standard Security Architecture, Basic Security Architecture, and Essential Security Architecture. The AWS Security Guide and AWS Security Architecture proposed in this paper are expected to help many businesses and institutions that are hoping to establish and operate a safe and reliable AWS cloud system in the social network environment.


2022 ◽  
Vol 2022 ◽  
pp. 1-10
Author(s):  
Lan Zhang

With the continuous development of social economy, social sport is more and more valued and favored by the people as a universal and nationwide sport, but it should be noted that social sport involves a wide range of aspects, but due to its particularity, it is also constrained by economic development. In view of these needs and limitations, three technical methods of entropy method, RSR (rank-sum ratio), and TOPSIS are introduced, to sort out the development of social sports, national physical development, social sports guidance, and the number of people to be measured in various places based on the relevant technologies of smart cities in this paper, realize the application analysis of social sports in the public service level. This paper aims to provide a scientific evaluation and evaluation method for social sports information cloud services. The results of simulation experiments show that the evaluation of social sports information cloud service quality based on smart cities is effective, and the comprehensive application of methods can be implemented perfectly, and the further promotion and popularization of social sports services can be realized.


2022 ◽  
Author(s):  
Tahereh Abbasi-khazaei ◽  
Mohammad Hossein Rezvani

Abstract One of the most important concerns of cloud service providers is balancing renewable and fossil energy consumption. On the other hand, the policy of organizations and governments is to reduce energy consumption and greenhouse gas emissions in cloud data centers. Recently, a lot of research has been conducted to optimize the Virtual Machine (VM) placement on physical machines to minimize energy consumption. Many previous studies have not considered the deadline and scheduling of IoT tasks. Therefore, the previous modelings are mainly not well-suited to the IoT environments where requests are time-constraint. Unfortunately, both the sub-problems of energy consumption minimization and scheduling fall into the category of NP-hard issues. In this study, we propose a multi-objective VM placement to joint minimizing energy costs and scheduling. After presenting a modified memetic algorithm, we compare its performance with baseline methods as well as state-of-the-art ones. The simulation results on the CloudSim platform show that the proposed method can reduce energy costs, carbon footprints, SLA violations, and the total response time of IoT requests.


2022 ◽  
Vol 30 (1) ◽  
pp. 655-689
Author(s):  
Osama Abied ◽  
Othman Ibrahim ◽  
Siti Nuur-Ila Mat Kamal

Cloud computing in governments has become an attraction to help enhance service delivery. Improving service delivery, productivity, transparency, and reducing costs necessitates governments to use cloud services. Since the publication of a review paper on cloud adoption elements in e-governments in 2015, cloud computing in governments has evolved into discussions of cloud service adoption factors. This paper concentrates on the adoption of cloud computing in governments, the benefits, models, and methodologies utilized, and the analysis techniques. Studies from 2010 up to 2020 have been investigated for this paper. This study has critically peer-reviewed articles that concentrate on cloud computing for electronic governments (e-Governments). It exhibits a systematic evaluation of the empirical studies focusing on cloud adoption studies in e-governments. This review work further categorizes the articles and exhibits novel research opportunities from the themes and unexhausted areas of these articles. From the reviewed articles, it has been observed that most of the articles have employed the quantitative approach, with few utilizing qualitative and mixed-method approaches. The results reveal that cloud computing adoption could help solve problems in learning, such as infrastructure issues, cost issues, and improve service delivery and transparency. This review gives more information on the future directions and areas that need attention, like the trust of cloud computing in e-governments.


Sign in / Sign up

Export Citation Format

Share Document